Instrumentation Detection
Dynamic instrumentation (Dynamic Binary Instrumentation - DBI) is a powerful technique used by both security researchers and attackers. Tools such as Frida, Xposed, Objection and Magisk allow injecting scripts into the application's process in real time to intercept function calls, modify return values and bypass security logic (such as password verification or SSL Pinning) without needing to modify the binary on disk.
Technical Mechanism: MAD uses advanced behavioral detection techniques, and is based on signatures:
• Anti-Hooking: Checks the integrity of the prologue of critical functions in memory (detecting trampolines or control-flow redirections inserted by hooks). • Memory and Process Scanning: Searches for known injected libraries , suspicious threads and open communication ports. • Permission Detection: Monitors attempts to access protected memory areas.
This detection is enabled by default and cannot be disabled.
Last updated